The new solution aims to defend against application exploits in real-time.
Juniper Networks this week unveiled a new Cloud Workload Protection. The company claims this solution can defend apps from exploit-based attacks as they happen. Moreover, it provides the protection for apps running in the cloud or on-premises.
Application vulnerabilities are one of the most common causes of data breaches. Coding errors can present opportunities for hackers to get inside the app and exploit the underlying resources and processes. These include databases and data collectors that can give them access to potentially damaging information.
“Always the potential for risk”
Kate Adam, Sr. Director of Security Product Marketing at Juniper, detailed the new offering in a blog post. “Organizations may not even be aware that certain application vulnerabilities exist until it’s too late,” she writes.
“As much as every organization tries to adhere to a secure software development lifecycle (SDLC) to build secure applications from the start, there’s always the potential for risk. This means there will always be vulnerabilities that attackers can exploit.”
“We’re thrilled to announce Juniper Cloud Workload Protection to automatically defend application workloads in any cloud or on-premises data center environment against application exploits as they happen, including the Open Web Application Security Project® (OWASP) Top 10 and memory-based attacks.”
Juniper Cloud Workload Protection is a lightweight software agent that controls application execution and monitors the application’s behavior and context in real-time, Adam writes. Vulnerability remediation is done automatically without admin intervention.
Leveraging Zero Trust Data Center Architecture
Juniper Cloud Workload Protection is the newest part of Zero Trust data center architecture. Juniper’s data center networking solutions and Connected Security strategy connect and orchestrate application infrastructure across multiple data center environments, Adam explains.
It also secures every point of connection along the way, from the DC gateway to the interconnect, between servers and within application workloads.
“Visibility, intelligence and enforcement must extend to every point of connection on the network to effectively safeguard users, applications and infrastructure,” Kim concludes.
“That’s what Juniper Cloud Workload Protection and the Zero Trust data center architecture deliver, connecting and protecting applications in any cloud while ensuring great user experiences.”